"Today, we are struggling to secure mobile payments yet trying to convert a wallet full of credit cards into an app that lives on our phone. If we hope to store more and more sensitive information on mobile devices, the current levels of risk are unacceptable. If credit cards are falling prey to hackers, how can we consider adding driver's licenses, passports, health insurance cards and employee IDs to mobile wallets? Can we really trust a phone to store our personal health records and biometric data?", CardNotPresent

"Containerized apps are vulnerable because they rely on the same operating system (OS) services used by apps outside the container. Thus, a malicious app located outside the container can intercept data passed back and forth between the containerized apps and the smartphone's screen and keyboard",Network Computing

"The higher the volume of mobile payments, the more hackers stand to gain from breaches. Unless the mobile industry accepts that business as usual is not an option, we’re effectively waiting for a massive breach to derail the mobile payments train and scare consumers away from financial innovation. To get back on offense and start addressing the challenge at hand, the mobile industry needs to embrace mobile virtualization", IT Briefcase

"BYOD is changing the way organizations will be managing corporate data security. In this article, we discuss how exactly mobile virtualization will be impacting data privacy and security on mobile devices", IT WORLD CANADA

"Fortunately, there's a variety of approaches to address the problem, including one offered by the Israeli startup Cellrox, which creates two totally separate work spaces on smartphones — a personal one and a work one.", Ha'aretz

"Cellrox believe that it is better than the other solutions out there, because unlike some of the other solutions, its virtualisation software was designed and written first and foremost for mobile devices, rather than being based on and derived from server virtualisation solutions", This Mobile Life

"No one wants to carry multiple smartphones, but we still have businesses and lifestyles that call for it. To preserve our privacy, to make mobile devices reflect our lifestyles and to protect what matters, we have to embrace mobile virtualization", Mobile Enterprise

"Companies such as Bromium and Cellrox are offering virtual machine technology for these devices today that is designed to isolate specific applications and their data as well as to control access.", ZDNet